Data Center Site Infrastructure Tier Standard: Operational Sustainability

Size: px
Start display at page:

Download "Data Center Site Infrastructure Tier Standard: Operational Sustainability"

Transcription

1 Data Center Site Infrastructure Tier Standard: Operational Sustainability

2 Abstract The Uptime Institute Tier Standard: Operational Sustainability is an objective methodology for data center owners to align the facility management program with the specific Tier of installed site infrastructure in order to achieve the organization s business objectives or mission imperatives. Tier Standard: Operational Sustainability establishes the behaviors and risks beyond the Tier Classification System (I, II, III, and IV) that impact long-term data center performance. Tier Standard: Operational Sustainability unifies site management behaviors with the Tier functionality of the site infrastructure. Keywords data center, infrastructure, Tier, Classification, Tiers, Tier level, topology, availability, reliability, redundant, Concurrent Maintenance, Concurrently Maintainable, Fault Tolerance, Fault Tolerant, Operational Sustainability, functionality, performance, metrics, Tier Standard, behaviors, risks, business objectives, mission imperatives, maintenance, failure response, critical load, capital investment, elements, Management & Operations, Building Characteristics, Site Location, design, construction, commissioning, transition-to-operations, Basic Capacity, Redundant Capacity, human error, staffing, organization, housekeeping, maintenance management system, service level agreements, life cycle, training, on-the-job training, planning, coordination, management, site policies, financial management, site infrastructure library, building features, design principles, operating conditions, natural disasters, man-made disasters, Abnormal Incident Reports database, method of procedure, failure analysis, preventive maintenance, predictive maintenance, deferred maintenance, quality control, site configuration procedures, standard operating procedures, emergency operating procedures, purpose built, security, access, setback, set point, flood plain, seismic zone, risk evaluation Copyrights This document is copyrighted by the Uptime Institute, LLC. Uptime Institute in making this document available as a reference to governmental agencies, public institutions, and private users does not waive any rights in copyright to this document. Uptime Institute s Publications are protected by international copyright law. Uptime Institute requires written requests at each and every occasion that Uptime Institute s intellectual property or portions of the intellectual property are reproduced or used. Uptime Institute copyright extends to all media paper, electronic, and video content and includes use in other publications, internal company distribution, company Web sites and marketing materials, and handouts for seminars and courses. For more information, please visit to download a Copyright Reprint Permission Request Form. 1

3 Introduction This introduction is not part of the Data Center Site Infrastructure Tier Standard: Operational Sustainability. It provides the reader with context for the application of the Standard. Tier Standard: Topology (available separately) describes the functionality requirements of the site infrastructure to meet the specific business objective or mission imperative. Long-term availability of data center infrastructure is not guaranteed by Tier alone. Tier Standard: Operational Sustainability defines the behaviors and risks beyond Tier that impact the ability of a data center to meet its uptime objectives over the long term. The uptime of a data center is the resultant combination of both Tier of the site infrastructure and Operational Sustainability. This Standard is a tool to help owners maximize infrastructure investment. Additionally, this Standard facilitates comparison of data centers from an operational perspective. Similar to Tier of installed infrastructure equipment, the rigor and sophistication of Operational Sustainability site management concepts and methodologies are established by the business requirements of the site. A Tier III performance requirement results in a more complex site infrastructure than a Tier I. Similarly, a Tier III data center requires more comprehensive behaviors and more rigor in mitigating risks than a Tier I. Therefore, Operational Sustainability behaviors and risk identification & mitigation are directly tied to the Tier Classification System. The three elements of Operational Sustainability, in order of decreasing impact to operations, are Management & Operations, Building Characteristics, and Site Location. Each of these three elements has multiple categories and components with associated behaviors and risk. The Institute Abnormal Incident Reports (AIRs) database reveals that the leading cause of reported data center outages are directly attributable to shorfalls in management, staff activities, and operations procedures. Accordingly, Management & Operations is the most influential element to sustain operations. Finally, Tier Standard: Operational Sustainability defines behaviors that result in more efficient operation of the data center, thereby offering opportunities to increase energy efficiency. Additional Factors and Exposures Uptime Institute Tier Standard: Topology and Tier Standard: Operational Sustainability establish a consistent set of performance criteria that can be satisfied, and adjudicated, worldwide. For the data center design, implementation, and sustained operation to be successful, additional factors and exposures must also be considered by the owner and project team. Many of these will be dictated by the site location as well as local, national, or regional considerations and/or regulations. For example, building codes and Authorities Having Jurisdiction (AHJs); seismic, extreme weather (high winds, tornado); flooding; adjacent property uses; union or other organized labor force; and/or physical security (either as corporate policy or warranted by immediate surroundings). Due to the many design and management options that may be dictated by the owner, regulated by local government, recommended by industry groups, or followed as a general practice, it is not feasible for Tier Standard: Topology and Tier Standard: Operational Sustainability to establish criteria for these additional factors and exposures worldwide. And, the Uptime Institute does not wish to displace or confuse the guidance of local experts, which are key for timely project delivery, regulatory compliance, and implementation of best practices. For a successful project, Uptime Institute recommends that the project team create a comprehensive catalogue of project requirements, which incorporates Tier Standard: Topology, Tier Standard: Operational Sustainability, and carefully considered mitigation measures of these additional factors and exposures. This approach will ensure the project meets the compliance objectives of Uptime Institute s international standards, as well as local constraints and owner s business case. 2

4 Contents 1.0 Overview Scope Purpose Tier Standard: Topology Relationship between Tiers and Operational Sustainability Exclusions from Operational Sustainability Reference Elements Of Operational Sustainability Management & Operations Building Characteristics Site Location Topology Enhancements Behaviors and Risks Table Organization Evaluating Effectiveness Prioritization Summary Certification... 7 Modifications... 7 Table 1.1 Management & Operations Staffing and Organization... 8 Table 1.2 Management & Operations Maintenance... 9 Table 1.3 Management & Operations Training Table 1.4 Management & Operations Planning, Coordination, and Management Table 1.5 Management & Operations Operating Conditions Table 2.1 Building Characteristics Pre-Operational Table 2.2 Building Characteristics Building Features Table 2.3 Building Characteristics Infrastructure Table 3.1 Site Location Natural Disaster Risk Table 3.2 Site Location Man-Made Disaster Risk

5 1. Overview 1.1 Scope This Standard establishes the Uptime Institute Data Center Site Infrastructure Tier Standard: Operational Sustainability. This Standard establishes the behaviors and risks beyond Tier of installed infrastructure that impact the ability of a data center to meet its business objectives or mission imperatives over the long term. This owner s Standard is complementary to the Tier Standard: Topology. Tier Standard: Topology establishes the performance requirements for configuration of the power and cooling equipment, including the capability for redundancy, planned maintenance work, or failure response without impacting the critical load. Tier Standard: Topology does not prescribe or constrain solutions. Rather the intent of Tier Standard: Topology is to provide the framework to align site infrastructure capital investment with the business objective(s) or mission imperative(s) that the data center supports. Tier Standard: Operational Sustainability provides the site management behaviors and risks contingent upon achievement of the site infrastructure. Consistent with the progressive nature of Tier Standard: Topology, Operational Sustainability behaviors increase in complexity and comprehensiveness as Tier increases. The three elements of Operational Sustainability are Management & Operations, Building Characteristics, and Site Location. Each of these three elements has multiple categories and components with associated behaviors or risks. The specific behaviors, prioritized so that owners may address highest risks first, are presented in table format in this Standard. The benefits of Operational Sustainability behaviors are fully realized when incorporated early into the project in the conceptual planning. Then, carried through design, construction, commissioning, and transition-to-operations and ultimately addressed on a persistent basis during the operational life of the data center. 1.2 Purpose Tier Standard: Operational Sustainability provides data center owners, operators, and managers with the prioritized behaviors and risks intrinsic to data center operations. Adherence to the recommended behaviors will assist in attaining the full performance potential of the installed infrastructure. This Standard is a tool to help owners maximize infrastructure investment. Additionally, this Standard facilitates comparison of data centers from an operational perspective. Tier Standard: Operational Sustainability establishes a baseline of site management behaviors by Tier. 1.3 Tier Standard: Topology Tier Standard: Topology establishes four distinctive definitions of data center site infrastructure using the Tier Classifications (I, II, III, and IV) and the performance confirmation tests for determining compliance to the definitions. The Tier Classification System describes the site-level infrastructure topology required to sustain data center operations, not the characteristics of individual systems or subsystems. For informational purposes, the following is a brief summary of each Tier from the Tier Standard: Topology. Tier I Basic Capacity: Site-wide shutdowns are required for maintenance or repair work. Capacity or distribution failures will impact the site. Tier II Redundant Capacity components: Site-wide shutdowns for maintenance are still required. Capacity failures may impact the site. Distribution failures will impact the site. Tier III Concurrently Maintainable: Each and every capacity component and distribution path in a site can be removed on a planned basis for maintenance or replacement without impacting operations. The site is still exposed to a equipment failure or operator error. Tier IV Fault Tolerant: An individual equipment failure or distribution path interruption will not impact operations. A Fault Tolerant site is also Concurrently Maintainable. 4

6 1.4 Relationship between Tiers and Operational Sustainability Similar to Tier of installed infrastructure, the rigor and sophistication of Operational Sustainability site management concepts and methodologies are driven by the business requirements of the site. All three Operational Sustainability elements impact the performance potential of the Tier topology of the installed infrastructure, yet the Management & Operations Element has the largest impact on long-term availability. Staffing levels, the approach to maintenance, and the number and details of processes and procedures are illustrative categories of the Management & Operations Element that are directly related to each Tier level. 1.5 Exclusions from Operational Sustainability Safety, environmental, and personnel management are not addressed in Tier Standard: Operational Sustainability. Failure to address any of these will add significant risk to data center operations. Yet, these items are excluded from the Standard because they are under the purview of a) management or internal corporate compliance audit groups and/or b) external enforcement and regulatory agencies. 1.6 Reference Data Center Site Infrastructure Tier Standard: Topology ( 2. Elements Of Operational Sustainability 2.1 Management & Operations Analysis of the Institute AIRs database reveals that the majority of the reported data center outages are directly attributable to human error. Human error includes operator error but more importantly, speaks to management decisions regarding staffing, maintenance, training, and overall rigor of the operation. The right number of qualified people is critical to meeting long-term performance objectives. Without the right number of qualified employees organized correctly, a data center does not have the resources to be successful. After correct staffing, a comprehensive approach to maintaining a data center is an absolute requirement to achieve the uptime objective. An effective maintenance program encompasses increasingly rigorous preventive maintenance (PM), housekeeping policies, maintenance management system (MMS) to track work, and service level agreements (SLAs). As the performance objective increases, the requirements for documentation, complexity, and detail for each of these items increases. In addition, a comprehensive training program ensures consistent operations and maintenance of a data center s infrastructure. All personnel must understand policies, procedures, and unique requirements of work in the data center to avoid unplanned outages and respond to anticipated events. 2.2 Building Characteristics Building Characteristics include commissioning, building features, and infrastructure that can potentially affect attainment of availability objectives. An extensive commissioning program is critical to a data center achieving a desired uptime objective. Comprehensive commissioning is the only way to ensure that the site infrastructure functions according to the design. It also provides the data center operators the opportunity to operate and test procedures without impacting the critical environment. Commissioning should exercise the equipment enough to identify potential manufacturing defects. Building features can positively or negatively impact the availability objectives. Building features that support performance objectives include purpose-built data centers, adequate space for support and specialty spaces, and controlled access areas. Additional infrastructure beyond just providing power and cooling is necessary to support the operation of a data center. Mechanical support systems such as chemical treatment and fuel scrubbing extend the life of a system and decrease the risk of failure. Having adequate space to safely conduct normal maintenance activities also reduce the risk of human error. The space, power, and cooling exhaust points must be aligned and monitored to avoid wasted capital expenditures. 5

7 2.3 Site Location The highest level of functionality in a data center can be easily defeated by a local or regional disaster whether relating to natural occurrences or man-made factors. The site selection process for a new data center should evaluate the risks of these types of disasters. For new or existing data centers, these risks must be well documented, signed off by management, and with the proper level of mitigation in place. Thus, both management expectations and the likely impact of the event on availability are accounted for. Depending on the performance objective, mitigation actions may be required. 3. Topology Enhancements It is the data center owner s prerogative to enhance topology above that required for a specific Tier. Therefore, topology enhancements are not one of the Operational Sustainability Building Characteristics behaviors in this Standard. However, topology enhancements can significantly increase the performance potential by providing redundant capacity/distribution paths or Fault Tolerance above that required for a specific Tier. Having redundant components in a Tier IV System+System configuration reduces the risk of human error. Owners should consider practical topology enhancements for critical systems to support their Operational Sustainability program. The evaluation of topology enhancements should balance the synergies of having greater operational flexibility with greater operational complexity. 4. Behaviors & Risks 4.1 Table Organization The tables in this Standard list and categorize the Operational Sustainability behaviors and risks. As the uptime objective (Tier) of a data center increases so does the number of Operational Sustainability behaviors required to achieve that objective. The behaviors applicable for each specific Tier are marked with a check. The Site Location tables list the risks that should be evaluated. The tables also provide specific criteria to determine the magnitude of the risk. Develop mitigation plans for each risk identified. 4.2 Evaluating Effectiveness The tables provide behaviors not requirements. There are many different ways to achieve these behaviors. It is important the behaviors both exist and are effective in order for the data center to achieve it uptime objective. There are three core principles to determine Operational Sustainability effectiveness: Proactive, Practiced, and Informed. Evidence of all three principles must be present for a behavior to be considered effective Proactive - Is there a continuous improvement component present to ensure the processes and procedures are always being improved and kept updated? Behaviors are anticipated and appropriate processes and procedures are in place in advance. Evidence of a Proactive principle includes well-documented processes for all existing and anticipated activities with procedures in place for regular review and update Practiced - Are processes and procedures always followed? Having processes and procedures alone will not enhance Operational Sustainability unless all data center personnel consistently follow a disciplined approach. A task or procedure always accomplished the same way, no matter who is performing it, is evidence of this principle Informed - Is the knowledge to achieve a behavior held by the organization or an individual? Do all staff have knowledge of and access to all processes and procedures for any activity they might be required to perform? For example, does the maintenance technician required to perform a specific activity: 1) know there is a method of procedure (MOP) available for that activity, 2) where to find it, and 3) is granted access to it. 6

8 4.3 Prioritization The prioritization of the Management & Operations and Building Characteristic behaviors are based on analysis of the AIRs database. Within each element, the categories and components are listed in the tables in order of decreasing importance. Site Location risks are of equal importance but specific criteria identifies the risk scale as higher or lower based on the magnitude of potential impact. The level of mitigation in place will reduce potential impact to operations. 5. Summary The behaviors established in Tier Standard: Operational Sustainability combined with the infrastructure requirements in the Tier Standard: Topology are essential for a site to achieve its uptime potential. The installed infrastructure alone cannot ensure the long-term viability of the site unless Operational Sustainability behaviors are addressed. Site management teams that incorporate the principles of both Standards will have notably better results in realizing or exceeding the full uptime potential of the installed infrastructure. 6. Certification The Uptime Institute reserves the exclusive right to rate and Certify data centers according to Tier Standard: Topology and Tier Standard: Operational Sustainability. Please refer to Modifications This Standard incorporates wording and organizational changes to clarify select behaviors. The Operational Sustainability Rating information is available at 7

9 Staffing and Organization Category Applicable for Tier Component Behavior I II III IV Staffing 1. Individual assigned full or part time to oversee critical facility operations 2. Staff and/or vendors to support the business presence objective x 7 staff presence: minimum of 1 qualified FTE x 7 staff presence: 2 qualified FTEs of facility support per shift 5. Total FTE count numerically matches work load requirements 6. Escalation and call-out procedures are in place for assigned staff and specified vendor support for designated critical systems and equipment 7. Engineering trade (e.g., electrical, mechanical, controls, building management system [BMS], etc.) coverage split by shift based on operations and maintenance requirements Qualifications 1. Appropriate staff trade licenses required by governmental regulation 2. Experience and technical training required to properly maintain and operate the installed infrastructure 3. Shift personnel qualified for specific shift operations individually and as a shift team Organization 1. Organization chart showing reporting chain and all interfaces between the Facility, Engineering, Information Technology (IT), and Security groups 2. Critical facility job descriptions available and in use 3. Roles and responsibilities matrix covering all activities at the data center available and in use 4. Key individuals and alternates are designated 5. Integrated approach to operational management, including all facets of the data center operation (Facilities, IT, and Security) Table 1.1 Management & Operations Staffing and Organization Category 8

10 Maintenance Category Applicable for Tier Component Behavior I II III IV Preventive Maintenance Program Housekeeping Policies Maintenance Management System 1. Effective preventive maintenance (PM) program including list of maintenance actions, due dates, and record of completion 2. PM program encompasses original equipment manufacturer (OEM) maintenance recommendations 3. Detailed procedures for switching between redundant equipment available and in use 4. Fully scripted preventive maintenance activities (PMs) (e.g., through a method of procedure [MOP] process) 5. Quality control process in place that validates a) the proper completion of and b) the quality of the PM 1. Computer room floor and underfloor free of dirt and debris 2. Data center free of combustibles, cleaning equipment, shipping boxes, or personal conveniences items (e.g., coffee pots, microwaves) 3. Housekeeping policies available and enforced to ensure a contaminant free data center environment 1. Effective maintenance management system ([MMS] paper or computerized) to track status of all maintenance activities available and in use 2. Maintains list of installed equipment (make, model, year of manufacture, year of installation, operating specifications, warranty information, etc.) 3. Work orders list special tools or parts required to complete PMs 4. Maintains performance/trend data on equipment and history of maintenance activities 5. Tracks calibration requirements 6. Maintains list of critical spares and reorder points Vendor Support 1. List of qualified vendors by system available for normal and emergency work Deferred Maintenance Program Predictive Maintenance Program 2. Service level agreements (SLA) outlining scope of work, PM schedule, training requirements, and response times for all critical systems 3. Vendor call-in process and points-of-contact for pre-approved and qualified technician(s) 1. PM accomplishment rate greater than (>) 90% 2. PM accomplishment rate of 100% 3. Process for tracking deferred maintenance and executing it during a maintenance window 1. Effective predictive maintenance program Life-Cycle Planning Failure Analysis Program 1. Effective process for planning, scheduling, and funding the life-cycle replacement of major infrastructure components 1. Maintains list of all outages including dates, times, infrastructure equipment/ systems involved and specific computing outages, root-cause analysis, and lessons learned 2. Effective process to determine root cause, identify lessons learned, and implement corrective actions 3. Trend analysis process Table 1.2 Management & Operations Maintenance Category 9

11 Training Category Applicable for Tier Component Behavior I II III IV Data Center Staff Training Vendor Training (Part-time Support) 1. On-the-job training (OJT) program for each new employee on a) the system(s) they will be responsible for operating and maintaining, and b) the rules of working in the data center 2. Documented formal classroom, operational demonstrations, and/or shift drills covering the following: All policies, processes, and procedures for the operation and maintenance of data center systems Site Configuration Procedures (SCPs) how the infrastructure is configured for normal operation Standard Operating Procedures (SOPs) how the infrastructure configuration is changed during normal operations Emergency Operating Procedures (EOPs) how the site is controlled and operated during abnormal circumstances or emergency situations MOPs MMS Procedures 3. Training programs include training schedule, lesson plans, required reference materials, and records of attendance 4. Formal qualification program for designated personnel performing data center operations 1. List of training required before a vendor is allowed to work in the data center 2. Briefing on data center processes and procedures with respect to the work to be performed 3. Formal training covering the appropriate subset of training received by the data center staff 4. Training programs include training schedule, lesson plans, required reference materials, and records of attendance Table 1.3 Management & Operations Training Category 10

12 Planning, Coordination, and Management Category Applicable for Tier Component Behavior I II III IV Site Policies 1. Formal documented policies and procedures for the following: Financial Process Reference Library Capacity Management Site staff performs all site infrastructure operations (e.g., configuration changes and operations under normal, emergency, or abnormal conditions) Site Configuration: site infrastructure configuration for normal operations Standard Operations: changes to normal operating configuration (e.g., shifting chillers) Emergency Operations: control of the site during abnormal circumstances or event Change Management: a) review and approval of changes to the site baseline and b) evaluation of risk as related to planned changes Mitigation plans for site risks 1. Process to ensure that operating and capital funding levels are consistently sufficient and available to support the business objective 2. Operating and capital budgets managed separately from non-critical facilities and are not pooled with other buildings or groups of buildings 1. The following reference and record documents available for use (off site or on site): As-built drawings Operation and maintenance documentation Studies (e.g., soils, structural, electrical, mechanical, breaker, circuit, etc.) Commissioning reports Warranty documentation and pre-purchased maintenance agreements Written automation sequences of operation 2. The previously listed reference and record documents available on site at all times 3. Reference documents located in centralized location (library) available to site operational personnel 4. Process ensuring master copies are maintained current with additional copies available to site operational personnel, vendors, designers, etc. 1. Process for managing the installation and removal of IT equipment from the computer room 2. Computer room floor plan developed and regularly reviewed/updated 3. Process for forecasting future space, power, and cooling growth requirements on a periodic basis (e.g., 1/6/12/24/36 month) 4. Tracking mechanism for current space, power, and cooling capacity and utilization reviewed periodically 5. Effective process for a) computer room airflow management and b) electrical power monitoring, management, and analysis Table 1.4 Management & Operations Planning, Coordination, and Management Category 11

13 Operating Conditions Category Applicable for Tier Component Behavior I II III IV Load Management Operating Set Points Rotating Redundant Equipment 1. Process to ensure the maximum loads are not exceeded and capacity is reserved for switching between components 1. Consistent operating set points (e.g., temperature, pressure, volumetric flow, etc.) established based on both risk to continuous availability and cost of operation 1. Effective process for alternating the use of redundant infrastructure equipment as part of the site maintenance program Table 1.5 Management & Operations Operating Conditions Category Pre-Operational Category Applicable for Tier Component Behavior I II III IV Commissioning 1. Factory witness testing (FWT) of critical infrastructure equipment 2. Receipt, installation, and pre-functional testing of critical infrastructure components 3. Functional testing, critical infrastructure stand-alone testing, and pre-system startup configuration 4. System start, OEM test, and individual system test (IST) 5. Integrated systems operational test (ISOT) Table 2.1 Building Characteristics Pre-Operational Category 12

14 Building Features Category Applicable for Tier Component Behavior I II III IV Purpose Built 1. Purpose-built data center Support and Specialty Spaces Security and Access 2. Single-purpose facility to support IT equipment operations 3. Stand-alone building physically separated from other corporate facilities on the site 4. Data center built to standards exceeding local building codes to ensure continued operations following a natural event 1. Adequate space separate from computer room for IT hardware receiving, storing, staging, building, and testing 2. Adequate space separate from computer room for the following functions: BMS/Building Automation System (BAS) control center Command Center/Disaster Recovery Parts and tool storage Engineering and Facility shop activities Meeting and training purposes 1. Controlled access to all computer rooms and support spaces 2. Controlled building access 3. Periodic review of access 4. Controlled site access Setbacks 1. Adequate space around the data center to minimize impacts from adjacent facilities Table 2.2 Building Characteristics Building Features Category 13

15 Infrastructure Category Applicable for Tier Component Behavior I II III IV Flexibility for Incremental Capacity Increases Infrastructure to Support Operations Ease of Maintenance Space, Power, and Cooling Exhaust Points 1. Designed and constructed so that computer room space can be reconfigured with reasonable effort, and incremental increases in space, power, and cooling can be accomplished with minimal risk to the existing critical load 2. Connection points for future/temporary extensions or capacity units 1. Mechanical support systems available (e.g., chemical treatment, fuel scrubbing, etc.) to extend the life of or protect the infrastructure 2. Mechanical systems installed to facilitate ease of operations 3. Consistent labeling of infrastructure equipment and standardized sizes 4. Electrical systems installed to facilitate ease of operations 1. Adequate space for the safe conduct of all normal maintenance activities on infrastructure equipment 2. Adequate space (sufficient swing radii, lifting points, and in/out pathways) for the safe conduct of rapid removal and replacement on infrastructure equipment 3. Equipment access provided to facilitate delivery and installation of motors or other large components 1. Data center design coordinated space, power, and cooling capacity exhaust points Table 2.3 Building Characteristics Infrastructure Category 14

16 Natural Disaster Risk Category Scale of Risk 1 Component Higher Lower Flooding (river, lake, reservoir, canal, pond, etc.) and Tsunami 2 < 100-Year Flood Plain > 100-Year Flood Plain Hurricanes, Tornadoes, and Typhoons High Medium Seismic Activity 3 > 0.8 m/s 2 < 0.8 m/s 2 Active Volcanoes High Medium Table 3.1 Site Location Natural Disaster Risk Category Man-Made Disaster Risk Category Scale of Risk 1 Airport /Military Airfield Adjacent Properties Exposures Component Higher Lower < 3 miles from any active runway; inside a 1 x 5-mile runway extension Chemical plant, fireworks factory, etc. > 3 miles from any active runway; outside a 1 x 5-mile runway extension Office building, undeveloped land, etc. Transportation Corridors < 1 mile > 1 mile Table 3.2 Site Location Man-Made Disaster Risk Category 1 The level of mitigation in place will reduce potential impact to operations. 2 Risk evaluation from the regional or local flood plain map or international equivalent. 3 Peak Ground Acceleration (meters per second squared [m/s 2 ]) that can be expected during the next 50 years with 10% probability. About the Uptime Institute Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and availability of business critical infrastructure through innovation, collaboration, and independent certifications. Uptime Institute serves all stakeholders responsible for IT service availability through industry leading standards, education, peer-to-peer networking, consulting, and award programs delivered to enterprise organizations and third-party operators, manufacturers, and providers. Uptime Institute is recognized globally for the creation and administration of the Tier Standards & Certifications for Data Center Design, Construction, and Operational Sustainability along with its Management & Operations reviews, FORCSS methodology, and Efficient IT Stamp of Approval. Questions? Please contact your regional representative: or us at: info@uptimeinstitute.com. Uptime Institute is a division of The 451 Group, a leading technology industry analyst and data company. Uptime Institute has office locations in the U.S., Mexico, Costa Rica, Brazil, U.K., Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia. Visit for more information Uptime Institute, LLC. All rights reserved A

Data Center Site Infrastructure Tier Standard: Topology

Data Center Site Infrastructure Tier Standard: Topology Data Center Site Infrastructure Tier Standard: Topology Abstract The Uptime Institute Tier Standard: Topology is an objective basis for comparing the functionality, capacity, and expected availability

More information

Management & Operations Excellence

Management & Operations Excellence Management & Operations Excellence Scott Roots Business Development Director EMEA Operational Excellence 2015 Uptime Institute, LLC The global Data Center Authority 1000+ Certifications in over 80 Countries

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Avoid Failures and Delays on Data Center Capital Projects

Avoid Failures and Delays on Data Center Capital Projects Avoid Failures and Delays on Data Center Capital Projects Mustapha Louni Business Development Director Middle East & North Africa December 2016 2016 Uptime Institute, LLC The Global Data Center Authority

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Data Center Site Infrastructure Tier Standard: Topology

Data Center Site Infrastructure Tier Standard: Topology U P T I M E I N S T I T U T E Data Center Site Infrastructure Tier Standard: Topology Prepared by Uptime Institute Professional Services Copyright 2009 by the Uptime Institute Building 100 2904 Rodeo Park

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Retro-Commissioning of Data Centers

Retro-Commissioning of Data Centers Retro-Commissioning of Data Centers Agenda Unique traits of Data Centers (DCs) Benefits of Retro-Cx DCs Suitable candidates for Retro-Cx Phases of Retro-Cx Additional considerations for DCs 2 Unique Traits

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Energy Action Plan 2015

Energy Action Plan 2015 Energy Action Plan 2015 Purpose: In support of the Texas A&M University Vision 2020: Creating a Culture of Excellence and Action 2015: Education First Strategic Plan, the Energy Action Plan (EAP) 2015

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

A Practical Guide to Avoiding Disasters in Mission-Critical Facilities. What is a Disaster? Associated Business Issues.

A Practical Guide to Avoiding Disasters in Mission-Critical Facilities. What is a Disaster? Associated Business Issues. A Practical Guide to Avoiding Disasters in Mission-Critical Facilities Todd Bermont What is a Disaster? An event that can unexpectedly impact the continuity of your business Anything that injures or has

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

Avoid a DCIM Procurement Disaster

Avoid a DCIM Procurement Disaster Avoid a DCIM Procurement Disaster Matt Stansberry Senior Director, Uptime Institute 7 December 2016 2016 Uptime Institute, LLC Many organizations struggle with DCIM decisions Process takes too long, software

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

VERTIV SERVICE CAPABILITY

VERTIV SERVICE CAPABILITY VERTIV SERVICE CAPABILITY VERTIV SERVICE CAPABILITY Service Offering Manage the health of your entire critical infrastructure with a service partner who can offer you business continuity. Exactly the level

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

RFP Questions Guideline For Data Center Buyers

RFP Questions Guideline For Data Center Buyers RFP Questions Guideline For Data Center Buyers Rev: 00W0052015 1 P a g e This guideline document is a supporting download for our webinar titled 5 RFP Questions Data Center Buyers Must Ask a Provider and

More information

Dodging Data Center Operations Disasters

Dodging Data Center Operations Disasters Dodging Data Center Operations Disasters Lee Kirby President, Uptime Institute December, 2016 2016 Uptime Institute, LLC 1000+ Certifications in over 80 Countries 2 2016 Uptime Institute, LLC Downtime

More information

SE Engineering, PC strives to be a leader in the power system engineering field by providing our customers with the highest level of quality,

SE Engineering, PC strives to be a leader in the power system engineering field by providing our customers with the highest level of quality, SE Engineering, PC strives to be a leader in the power system engineering field by providing our customers with the highest level of quality, integrity, and innovation. Our mission is to offer the safest,

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing

Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge

More information

Create a sustainable, high-performance university campus.

Create a sustainable, high-performance university campus. Create a sustainable, high-performance university campus. Discover how to maximize efficiency, safety, and productivity with an integrated university infrastructure. Make the most of your energy SM Today

More information

NC Education Cloud Feasibility Report

NC Education Cloud Feasibility Report 1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

Executive Summary. Zuma Engineering and Research. Data Center Virtualization Assessment. Service Description

Executive Summary. Zuma Engineering and Research. Data Center Virtualization Assessment. Service Description Executive Summary is firmly planted in the Green Computing movement by providing independent auditing of Information Technology (IT) data centers to assist with optimizing performance and reducing their

More information

Course Description. Audience. Prerequisites. : Course CTDC : Certified TIA-942 Design Consultant. Course Outline :: CTDC ::

Course Description. Audience. Prerequisites. : Course CTDC : Certified TIA-942 Design Consultant. Course Outline :: CTDC :: Module Title Duration : Course CTDC : Certified TIA-942 Design Consultant : 3 days Course Description Data centres are at the core of many organisations. Downtime of the data centre could lead to major

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

HPE Energy Efficiency Certification Service

HPE Energy Efficiency Certification Service Data sheet HPE Energy Efficiency Certification Service HPE Technology Consulting As power consumption and heat generation in the data center increase due to information explosion, big data, e-commerce,

More information

BROCHURE. Coromatic Operations We manage the operation of your mission critical sites

BROCHURE. Coromatic Operations We manage the operation of your mission critical sites BROCHURE Coromatic Operations We manage the operation of your mission critical sites Hospitals Head offices Full access and competence 24/7 24/7 service desk with incident response team Local and Nordic

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

DR and EE Standards for SCE Buildings

DR and EE Standards for SCE Buildings Design & Engineering Services DR and EE Standards for SCE Buildings Prepared by: Design & Engineering Services Customer Service Business Unit Southern California Edison December 2011 Acknowledgements Southern

More information

Schneider Electric Critical Power & Cooling Services. Services to keep your mission-critical applications operating at optimal performance

Schneider Electric Critical Power & Cooling Services. Services to keep your mission-critical applications operating at optimal performance Schneider Electric Critical Power & Cooling Services Services to keep your mission-critical applications operating at optimal performance The Data Center Life Cycle Whether you are planning, building,

More information

Your experts for coal assets

Your experts for coal assets Your experts for coal assets We are Uniper Your benefits We are a leading international energy company with operations in more than 40 countries and around 13,000 employees. We combine a balanced portfolio

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS)

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS) APPENDI 2 ommendation () () 1. The City Manager in consultation with the Chief Information Officer give consideration to the establishment of an IBMS governance model which provides for senior management

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

HAMILTON COUNTY EMERGENCY OPERATIONS PLAN ANNEX L - EMERGENCY SUPPORT FUNCTION #12 ENERGY

HAMILTON COUNTY EMERGENCY OPERATIONS PLAN ANNEX L - EMERGENCY SUPPORT FUNCTION #12 ENERGY HAMILTON COUNTY EMERGENCY OPERATIONS PLAN ANNEX L - EMERGENCY SUPPORT FUNCTION #12 ENERGY COORDINATING: SUPPORT: Hamilton County Engineer s Office Duke Energy/Local Public Utility Companies Hamilton County

More information

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product. Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics DRAFT February 19, 15 BES Security s Working Group Page 1 of 7 Chapter X Security Performance s 1 3 3 3 3 0 Background The State of Reliability 1 report noted that the NERC PAS was collaborating with the

More information

CERTIFICATION vs. CERTIFICATE

CERTIFICATION vs. CERTIFICATE CERTIFICATION vs. CERTIFICATE Certification Training Certificate Focus Assessing current knowledge and skills usually broad in scope Training individuals to achieve knowledge and skills (usually focused

More information

Convergence of BCM and Information Security at Direct Energy

Convergence of BCM and Information Security at Direct Energy Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

HPE Data Center Operations Consulting Service

HPE Data Center Operations Consulting Service Data sheet HPE Data Center Operations Consulting Service HPE Packaged Consulting Services Data centers are large-scale capital investments that may not meet their capacity, availability, and operational

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 FAC-003-4 Transmission Vegetation Management. Registered Entity Name: Applicable Function(s): Applicable only for TO and GO Compliance Monitoring Method: RSAW Version:

More information

Service Plan for Infrastructure Engineering

Service Plan for Infrastructure Engineering Service Plan for Infrastructure 2016-2019 Capital Regional District Date submitted: Revised: August 14, 2017 Table of Contents 1 Overview... 1 1.1 Division & Service Summary... 1 1.2 Organization Chart...

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Open Access. Definitions

Open Access. Definitions Open-IX Data Center Technical Standards Version 2.0, January 1, 2018 Questions: dc-group@open-ix.org The purpose of the Open- IX Data Center Technical Standards document is to establish a recommended standard

More information

Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build. Jay Brister, Vice President, Business Development, Power

Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build. Jay Brister, Vice President, Business Development, Power Requirements and Benefits of Programmatic vs. Project Driven Approach to New Build Jay Brister, Vice President, Business Development, Power April 23, 2015 AECOM Overview Page 2 AECOM Overview AECOM is

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-002-5.1 Cyber Security BES Cyber System Categorization This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR

More information

Demystifying GRC. Abstract

Demystifying GRC. Abstract White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu June 5, 2018

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Commissioning Mission Critical Facilities

Commissioning Mission Critical Facilities Commissioning Mission Critical Facilities HH Angus and Associates Limited Consulting Engineers 1127 Leslie Street Toronto, ON M3C 2J6 416 443 8200 info@hhangus.com www.hhangus.com Commissioning Mission

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Streamlined FISMA Compliance For Hosted Information Systems

Streamlined FISMA Compliance For Hosted Information Systems Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and

More information

Build vs. Buy. A ColoHouse Data Center Whitepaper

Build vs. Buy. A ColoHouse Data Center Whitepaper Build vs. Buy A ColoHouse Data Center Whitepaper The need for data center space is growing while demand continues to outpace supply. In this examination, we weigh the options of building and maintaining

More information

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Information Technology Disaster Recovery Planning Audit Redacted Public Report 1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

2014 NASCIO Recognition Award Nomination

2014 NASCIO Recognition Award Nomination 2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes

More information

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk

More information